CN109600371A - A kind of network layer leakage location and method - Google Patents

A kind of network layer leakage location and method Download PDF

Info

Publication number
CN109600371A
CN109600371A CN201811499157.8A CN201811499157A CN109600371A CN 109600371 A CN109600371 A CN 109600371A CN 201811499157 A CN201811499157 A CN 201811499157A CN 109600371 A CN109600371 A CN 109600371A
Authority
CN
China
Prior art keywords
detection
loophole
module
server
network layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811499157.8A
Other languages
Chinese (zh)
Inventor
陈俊宇
吴松洋
鲍亮
俞少华
张镇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Third Research Institute of the Ministry of Public Security
Original Assignee
Third Research Institute of the Ministry of Public Security
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Third Research Institute of the Ministry of Public Security filed Critical Third Research Institute of the Ministry of Public Security
Priority to CN201811499157.8A priority Critical patent/CN109600371A/en
Publication of CN109600371A publication Critical patent/CN109600371A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Abstract

The invention discloses a kind of network layer leakage location and method, this programme is based on active scan and checks whether system is possible to be attacked, and the behavior attacked system is simulated using program, then analyzes result;Common detection vulnerability database is established to known network hole, the different method of different vulnerability exploits is detected, and loophole existing for server itself is quickly scanned using multithreading.Loophole existing for server network network layers itself can quickly be scanned using this programme.

Description

A kind of network layer leakage location and method
Technical field
The present invention relates to network technologies, and in particular to network security technology.
Background technique
With internet+development, many traditional industries make the transition to internet industry one after another, various websites layers on internet It is not poor out, with and to be exactly network security problem, hacker attack enterprise Web server is oneself to seek its interests, most of to look forward to Industry never pays attention to network security problem.
However it is directed to server attack, currently used is all addition guard system, all kinds of antivirus softwares.But it is existing at present The technology of useful cloud or locally-installed securing software filters seldom the type of attack, and lacks real-time statistics user The data that server is attacked, if user will protect the server of oneself to be typically necessary connection manufacturer, process is cumbersome and ties up Protect into height.
Summary of the invention
For the problems of existing server security guard technology, a kind of new server security protection side is needed Case.
For this purpose, the purpose of the present invention is to provide a kind of network layer leakage locations, and provided based on the detection system Thus a kind of detection method can be realized and quickly scan loophole existing for server network network layers itself, the situation that springs a leak is counted.
In order to achieve the above object, network layer leakage location provided by the invention, including processor, and be stored with The computer-readable medium of computer program, when the computer program is executed by processor:
It checks whether system is possible to be attacked based on active scan, and simulates the row attacked system using program Then to analyze result;
Common detection vulnerability database is established to known network hole, the different method of different vulnerability exploits is detected, And loophole existing for server itself is quickly scanned using multithreading.
Further, the detection system main functional modules include port detecting module, weak passwurd scan module, injection Scan module and web vulnerability scanning module;
The opening imformation of port detecting module quick detection server network network layers external disclosure port;
The dictionary that the weak passwurd scan module is combined based on special common weak password and account, is sent out based on development language It takes business protocol emulation to log in, simulation, which logins successfully, is identified as weak passwurd;
Data-query interfaces existing for database service port that the injection scan module opens server or web Injection loophole scanning is carried out, is communicated and submitted the malice constructed to infuse using corresponding agreement for database service port Enter sentence, if sensitive information can be obtained, is identified as that there are injection loopholes;
The Web vulnerability scanning module crawls all url under domain name by writing crawler, is then put up by calling Vulnerability database actively initiates http request, detects corresponding url to produce loophole existing for web.
Further, the port detecting module sending and receiving by data packet, different values represents different shapes State.
Further, the detection system further includes report export module and solution scheme module;
The result that all vulnerability scannings come out is counted and is divided and in the form of report by the report export module Export;
The solution module is according to the type queries solution library of each loophole.
In order to achieve the above object, network layer leak detection method provided by the invention, comprising:
It checks whether system is possible to be attacked based on active scan, and simulates the row attacked system using program Then to analyze result;
Common detection vulnerability database is established to known network hole, the different method of different vulnerability exploits is detected, And loophole existing for server itself is quickly scanned using multithreading.
Further, the detection method includes:
(1) scan task is established for server to be detected;
(2) start scan task, start automatically scanning loophole;
(3) detecting server port information and detection service weak passwurd;
(4) detection service device injection loophole.
Further, the detection method after user logs in detection system, fills in server when establishing scan task IP address or domain name add the information such as port, Mission Profile to establish new task, and relevant information is stored into mysql database In.
Further, for the detection method in automatically scanning loophole, detection service device whether there is web services first, Whole url information are crawled to web site using crawler, comprehensive web url and system vulnerability library are established scan task, started multi-thread Journey is scanned the scanning of task, finally saves scanning result.
Further, the detection method is believed in detecting server port information and detection service weak passwurd from task IP information is extracted in breath, and the methods of active TCP or UDP are carried out for IP and are scanned, the unlatching of Service-Port is detected Situation, for server open port in find ssh, ftp, telnet, vnc, mssql, mysql, postgresql, rsh, Imap, nntp, pcantwhere, pop3, rexec, rlogin, smbnt, smtp, svn, vmauthd, snmp service, and open Multithreading carries out weak passwurd explosion, finally records explosion situation.
Further, the detection method utilizes the url information searching of crawler offer in detection service device injection loophole Decanting point, comprehensive sql injecting principle construct malicious code, carry out numeric type, character type, echo, report an error, the inspection of blind note injection mode It surveys, finally saves result.
Further, further include terminating in scan task in the detection method, return to the step of tasks secure examining report Suddenly, scanning loophole is classified and is summarized, inquire solution library respectively, generate safety detection report.
The scheme more fully detection service device security breaches that this programme provides, and operate convenient, it can effectively solve the problem that Existing server is the problems of in terms of security protection.
This programme in specific application, can quickly scan loophole existing for server network network layers itself;And according to need Will also statistics available spring a leak situation and solution, to prevent hacker attack path.
Detailed description of the invention
The present invention is further illustrated below in conjunction with the drawings and specific embodiments.
Fig. 1 is the composition exemplary diagram of network layer leakage location in present example;
Fig. 2 is the implementation flow chart of network layer Hole Detection in present example.
Specific embodiment
In order to be easy to understand the technical means, the creative features, the aims and the efficiencies achieved by the present invention, tie below Conjunction is specifically illustrating, and the present invention is further explained.
This example is directed to server, and network-based detection technique uses the Network status detection of test object The scanning modes such as TCP, UDP carry out port scan and survival detection, and after testing, rate of false alarm is very low for scan method;For to leakage Flexible testing mechanism is set up in hole detection, can advantageously be modified, be deleted, adding information and method in vulnerability database, and using Loophole existing for the quick scanning server of the mode of multithreading.
Specifically, this programme is based on active scanning techniques, using active, non-destructive method checks system whether have can It can be attacked;The behavior attacked system is simulated using a series of program, and then result is analyzed;Also directed to The network hole known establishes common detection vulnerability database, and the different method of different vulnerability exploits is detected, while scan task Using multithreading to quickly scan loophole existing for server itself.
Referring to Fig. 1 which shows this example gives a kind of system of network layer leakage location based on the above principles Form exemplary diagram.
The network layer leakage location mainly includes network layer Hole Detection software program, remote server evidence obtaining journey Sequence is stored in corresponding computer-readable medium, and may operate in corresponding computer equipment, by computer equipment Processor, which calls, can quickly scan loophole existing for server network network layers itself when executing.
As seen from the figure, which mainly includes that port detecting module 110, weak passwurd scan mould Block 120, injection scan module 130 and web vulnerability scanning module 140.
Port detecting module 110 is other for the unlatching situation of quick detection server network network layers external disclosure port Module provides server basis information.It is sending and receiving by data packet that this module, which carries out port detection principle, different Value represents different states, sends and there are many mode of detection, such as TCP SYN scanning, TCP ACK scanning, TCP FIN scanning Deng.
Weak passwurd scan module 120 is sent out based on the dictionary that special common weak password and account combine based on development language Business protocol emulation is taken to log in, simulation logins successfully and is identified as weak passwurd, the service of support have ssh, ftp, telnet, vnc, mssql、mysql、postgresql、rsh、imap、nntp、pcantwhere、pop3、rexec、rlogin、smbnt、smtp、 svn、vmauthd、snmp。
Inject scan module 130, data query existing for the database service port or web for opening to server Interface carries out injection loophole scanning, is communicated and submitted the evil constructed using corresponding agreement for database service port Meaning injection sentence is identified as that there are injection loopholes if sensitive information can be obtained.
Web vulnerability scanning module 140 crawls all url under domain name by writing crawler using active scanning mode, Then by calling the vulnerability database put up actively to initiate http request, corresponding url is detected to produce loophole existing for web.
Further, network layer Hole Detection program further include: report export module 150 and solution scheme module 160.
Wherein, it reports export module 150, the result that all vulnerability scannings come out is counted and divided and with report What loophole form export, check local server there are convenient for administrator, each loophole will use solution mould Block inquires its solution, proposes help for administrator's patching bugs.
Solution module 160, according to the type queries solution library of each loophole, the solution of most of loophole Be it is similar, the solution of universal class a kind of can be used in the loophole of this series, can establish solution by this principle Scheme base provides various solutions for report export.
Thus the network layer leakage location constituted is in use, user only needs addition in system to need detection service device IP address, this system fast automatic can scan loophole existing for server network network layers itself, while statistics available go out to leak Hole situation can also form solution as needed, prevent hacker attack path.It is online convenient to be realized using this system Operation, and various detailed statistical data are capable of providing, effectively solve the problems, such as that user needs to protect the various cumbersome of server.
As an example, it is illustratively carried out below using loophole of the Home Network network layers leakage location to server network network layers The process quickly scanned online.
In this example, network layer leakage location is deployed in 8GB or more memory, and operation Linux system Hardware environment in.
Referring to fig. 2 which shows this example is based on network layer leakage location and sweeps to server network network layers progress loophole The implementing procedure retouched, whole flow process include the following steps:
Step 1. user's logging in network layer leakage location.
Step 2. creates scan task, the contents such as corresponding filling server info.
In the step, after user logs in detection system, server ip address is filled in by task module or domain name adds end The information such as mouth, Mission Profile establish new task, click and start scan button, and relevant information is stored into mysql data by system In library, and start to start scan module.
Step 3. starts scan task, and safety patrol system starts automatically scanning loophole.
Detection service device whether there is web services first, and the Web vulnerability scanning module in system is using crawler to web net Station crawls whole url information, and scan task is established in comprehensive web url and system vulnerability library, and starting multithreading is scanned task Scanning, finally save scanning result.
Step 4. safety patrol system detecting server port information and detection service weak passwurd.
In this step, weak passwurd scan module is called, IP information is extracted from mission bit stream, IP is carried out actively The methods of TCP or UDP are scanned, and detect the unlatching situation of Service-Port, are sought in the port opened for server Look for ssh, ftp, telnet, vnc, mssql, mysql, postgresql, rsh, imap, nntp, pcantwhere, pop3, Rexec, rlogin, smbnt, smtp, svn, vmauthd, snmp service, and open multithreading and carry out weak passwurd explosion, finally Record explosion situation.
Step 5. safety patrol system detection server injection loophole.
In this step, system calls injection scan module, the url information searching decanting point provided using crawler, such as id= 1.Comprehensive sql injecting principle constructs malicious code, carries out numeric type, character type, echoes, reports an error, the detection of blind note injection mode, most After save result.
Step 6. scan task terminates and returns to tasks secure examining report.
This step, system call report export module to be classified loophole is scanned and summarized, inquire solution respectively Library generates safety detection report.
It can be seen that this programme can detection service device security breaches more comprehensively, more rapidly, safer, can effectively solve Certainly existing server is the problems of in terms of security protection.
Finally it should be noted that the method or particular system unit or its part unit of aforementioned present invention, are pure software Framework can be laid in tangible media through program code, such as hard disk, disc or any electronic device (such as intelligent hand Machine, computer-readable storage media), when machine loading procedure code and execute (such as smartphone load and execution), Machine becomes to carry out the device of the invention.The method and apparatus of aforementioned present invention can also be penetrated with form of program codes Media are transmitted, if cable, optical fiber or any transmission kenel are transmitted, when program code is by machine (such as smartphone) It receives, load and execution, machine become to carry out the device of the invention.
The basic principles, main features and advantages of the present invention have been shown and described above.The technology of the industry Personnel are it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this The principle of invention, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these changes Change and improvement all fall within the protetion scope of the claimed invention.The claimed scope of the invention by appended claims and its Equivalent thereof.

Claims (10)

1. a kind of network layer leakage location, including processor, and it is stored with the computer-readable medium of computer program, It is characterized in that, when the computer program is executed by processor:
It checks whether system is possible to be attacked based on active scan, and simulates the behavior attacked system using program, Then result is analyzed;
Common detection vulnerability database is established to known network hole, the different method of different vulnerability exploits is detected, and is made Loophole existing for server itself is quickly scanned with multithreading.
2. network layer leakage location according to claim 1, which is characterized in that the detection system major function mould Block includes port detecting module, weak passwurd scan module, injection scan module and web vulnerability scanning module;
The opening imformation of port detecting module quick detection server network network layers external disclosure port;
The dictionary that the weak passwurd scan module is combined based on special common weak password and account sends clothes based on development language Business protocol emulation logs in, and simulation, which logins successfully, is identified as weak passwurd;
Data-query interfaces progress existing for database service port that the injection scan module opens server or web Injection loophole scanning is communicated and is submitted the malice constructed to inject language for database service port using corresponding agreement Sentence is identified as that there are injection loopholes if sensitive information can be obtained;
The Web vulnerability scanning module crawls all url under domain name by writing crawler, then by calling the loophole put up Http request is actively initiated in library, detects corresponding url to produce loophole existing for web.
3. network layer leakage location according to claim 2, which is characterized in that the port detecting module passes through number According to sending and receiving for packet, different values represents different states.
4. network layer leakage location according to claim 2, which is characterized in that the detection system further includes report Export module and solution scheme module;
The result that all vulnerability scannings come out is counted and is divided and exported in the form of report by the report export module;
The solution module is according to the type queries solution library of each loophole.
5. a kind of network layer leak detection method characterized by comprising
It checks whether system is possible to be attacked based on active scan, and simulates the behavior attacked system using program, Then result is analyzed;
Common detection vulnerability database is established to known network hole, the different method of different vulnerability exploits is detected, and is made Loophole existing for server itself is quickly scanned with multithreading.
6. network layer leak detection method according to claim 5, which is characterized in that the detection method includes:
(1) scan task is established for server to be detected;
(2) start scan task, start automatically scanning loophole;
(3) detecting server port information and detection service weak passwurd;
(4) detection service device injection loophole.
7. network layer leak detection method according to claim 6, which is characterized in that the detection method is establishing scanning When task, after user logs in detection system, fills in server ip address or domain name adds the information such as port, Mission Profile to establish New task, and relevant information is stored into mysql database.
8. network layer leak detection method according to claim 6, which is characterized in that the detection method is in automatically scanning When loophole, detection service device whether there is web services first, crawl whole url information, comprehensive web to web site using crawler Scan task is established in url and system vulnerability library, and starting multithreading is scanned the scanning of task, finally saves scanning result.
9. network layer leak detection method according to claim 6, which is characterized in that the detection method is serviced in detection When device port information and detection service weak passwurd, IP information is extracted from mission bit stream, and active TCP or UDP are carried out for IP The methods of be scanned, detect the unlatching situation of Service-Port, for server open port in find ssh, ftp, telnet、vnc、mssql、mysql、postgresql、rsh、imap、nntp、pcantwhere、pop3、rexec、rlogin、 Smbnt, smtp, svn, vmauthd, snmp service, and open multithreading and carry out weak passwurd explosion, finally record explosion situation.
10. network layer leak detection method according to claim 6, which is characterized in that the detection method takes in detection When business device injection loophole, the url information searching decanting point provided using crawler, comprehensive sql injecting principle constructs malicious code, into Line number font character type, is echoed, is reported an error, the detection of blind note injection mode, finally saves result.
CN201811499157.8A 2018-12-08 2018-12-08 A kind of network layer leakage location and method Pending CN109600371A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811499157.8A CN109600371A (en) 2018-12-08 2018-12-08 A kind of network layer leakage location and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811499157.8A CN109600371A (en) 2018-12-08 2018-12-08 A kind of network layer leakage location and method

Publications (1)

Publication Number Publication Date
CN109600371A true CN109600371A (en) 2019-04-09

Family

ID=65961544

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811499157.8A Pending CN109600371A (en) 2018-12-08 2018-12-08 A kind of network layer leakage location and method

Country Status (1)

Country Link
CN (1) CN109600371A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110516441A (en) * 2019-08-16 2019-11-29 中国电力科学研究院有限公司 A kind of intelligence safety protection detection for adopting terminal
CN111291382A (en) * 2020-01-22 2020-06-16 上海电子信息职业技术学院 Vulnerability scanning system
CN111447224A (en) * 2020-03-26 2020-07-24 江苏亨通工控安全研究院有限公司 Web vulnerability scanning method and vulnerability scanner
CN111475817A (en) * 2020-04-17 2020-07-31 北京墨云科技有限公司 Data collection method of automatic penetration test system based on AI
CN111488588A (en) * 2020-04-17 2020-08-04 北京墨云科技有限公司 Automatic penetration testing method based on AI
CN111949992A (en) * 2020-08-17 2020-11-17 中国工商银行股份有限公司 Automatic safety monitoring method and system for WEB application program
CN112637119A (en) * 2020-11-13 2021-04-09 北京大米科技有限公司 Host scanning method and device, storage medium and electronic equipment
CN113411356A (en) * 2021-08-23 2021-09-17 北京华云安信息技术有限公司 Vulnerability detection method, system, device and computer readable storage medium
CN114363059A (en) * 2021-12-31 2022-04-15 深信服科技股份有限公司 Attack identification method and device and related equipment
CN114584342A (en) * 2022-01-17 2022-06-03 北京中科微澜科技有限公司 Network vulnerability identification and detection system based on data analysis

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101808093A (en) * 2010-03-15 2010-08-18 北京安天电子设备有限公司 System and method for automatically detecting WEB security
US8695027B2 (en) * 2011-06-30 2014-04-08 Mcafee, Inc. System and method for application security assessment
CN104063309A (en) * 2013-03-22 2014-09-24 南京理工大学常熟研究院有限公司 Web application program bug detection method based on simulated strike
CN104363236A (en) * 2014-11-21 2015-02-18 西安邮电大学 Automatic vulnerability validation method
CN107547473A (en) * 2016-06-27 2018-01-05 黑龙江傲立辅龙科技开发有限公司 A kind of Security Vulnerabilities Scanner System
CN108712396A (en) * 2018-04-27 2018-10-26 广东省信息安全测评中心 Networked asset management and loophole governing system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101808093A (en) * 2010-03-15 2010-08-18 北京安天电子设备有限公司 System and method for automatically detecting WEB security
US8695027B2 (en) * 2011-06-30 2014-04-08 Mcafee, Inc. System and method for application security assessment
CN104063309A (en) * 2013-03-22 2014-09-24 南京理工大学常熟研究院有限公司 Web application program bug detection method based on simulated strike
CN104363236A (en) * 2014-11-21 2015-02-18 西安邮电大学 Automatic vulnerability validation method
CN107547473A (en) * 2016-06-27 2018-01-05 黑龙江傲立辅龙科技开发有限公司 A kind of Security Vulnerabilities Scanner System
CN108712396A (en) * 2018-04-27 2018-10-26 广东省信息安全测评中心 Networked asset management and loophole governing system

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110516441A (en) * 2019-08-16 2019-11-29 中国电力科学研究院有限公司 A kind of intelligence safety protection detection for adopting terminal
CN111291382B (en) * 2020-01-22 2022-04-08 上海电子信息职业技术学院 Vulnerability scanning system
CN111291382A (en) * 2020-01-22 2020-06-16 上海电子信息职业技术学院 Vulnerability scanning system
CN111447224A (en) * 2020-03-26 2020-07-24 江苏亨通工控安全研究院有限公司 Web vulnerability scanning method and vulnerability scanner
CN111475817B (en) * 2020-04-17 2023-08-11 北京墨云科技有限公司 Data collection method of automatic penetration test system based on AI
CN111488588A (en) * 2020-04-17 2020-08-04 北京墨云科技有限公司 Automatic penetration testing method based on AI
CN111475817A (en) * 2020-04-17 2020-07-31 北京墨云科技有限公司 Data collection method of automatic penetration test system based on AI
CN111488588B (en) * 2020-04-17 2023-08-11 北京墨云科技有限公司 Automatic penetration test method based on AI
CN111949992A (en) * 2020-08-17 2020-11-17 中国工商银行股份有限公司 Automatic safety monitoring method and system for WEB application program
CN111949992B (en) * 2020-08-17 2023-09-29 中国工商银行股份有限公司 Automatic safety monitoring method and system for WEB application program
CN112637119A (en) * 2020-11-13 2021-04-09 北京大米科技有限公司 Host scanning method and device, storage medium and electronic equipment
CN113411356A (en) * 2021-08-23 2021-09-17 北京华云安信息技术有限公司 Vulnerability detection method, system, device and computer readable storage medium
CN113411356B (en) * 2021-08-23 2021-12-10 北京华云安信息技术有限公司 Vulnerability detection method, system, device and computer readable storage medium
CN114363059A (en) * 2021-12-31 2022-04-15 深信服科技股份有限公司 Attack identification method and device and related equipment
CN114584342A (en) * 2022-01-17 2022-06-03 北京中科微澜科技有限公司 Network vulnerability identification and detection system based on data analysis
CN114584342B (en) * 2022-01-17 2024-02-06 北京中科微澜科技有限公司 Network vulnerability recognition and detection system based on data analysis

Similar Documents

Publication Publication Date Title
CN109600371A (en) A kind of network layer leakage location and method
US11853434B2 (en) System and method for creating and executing breach scenarios utilizing virtualized elements
US11627160B2 (en) Intelligent-interaction honeypot for IoT devices
CN111400722B (en) Method, apparatus, computer device and storage medium for scanning small program
EP4026297B1 (en) Honeypots for infrastructure-as-a-service security
Zhang et al. An IoT honeynet based on multiport honeypots for capturing IoT attacks
US9473522B1 (en) System and method for securing a computer system against malicious actions by utilizing virtualized elements
RU2657170C2 (en) Automated safety assessment of business-critical computer systems and resources
US7647631B2 (en) Automated user interaction in application assessment
US9336385B1 (en) System for real-time threat detection and management
US7765597B2 (en) Integrated crawling and auditing of web applications and web content
CN113704767A (en) Vulnerability scanning engine and vulnerability worksheet management fused vulnerability management system
Raj et al. A study on metasploit framework: A pen-testing tool
CN108965296A (en) A kind of leak detection method and detection device for smart home device
CN112615863A (en) Method, device, server and storage medium for resisting attack host
CN110099129A (en) A kind of data transmission method and equipment
Göbel et al. A novel approach for generating synthetic datasets for digital forensics
CN110768949B (en) Vulnerability detection method and device, storage medium and electronic device
CN114666104A (en) Penetration testing method, system, computer equipment and storage medium
Fredj Spheres: an efficient server-side web application protection system
Khan et al. Security assessment of four open source software systems
CN112738068B (en) Network vulnerability scanning method and device
CN114036505A (en) Safety operation and maintenance analysis server, safety operation and maintenance analysis method and computer equipment
Bellatriu Penetration testing automation system
Barreiros Exploring Security Controls for ICS/Scada Environments

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190409